CCNA4E_CH5_STUDY_GUIDE_KEY

advertisement
CCNA EXPLORATION
ACCESSING THE WAN
Study Guide
Chapter 5: ACLs
5.1.1 Describe port numbers.
0 – 1023 Well Known Ports
1024 – 49151 Registered Ports
49152 – 65535 Private and/or Dynamic Ports
What are some of the well known & registered
Well known:
TCP ports?
21 – FTP (Also Port 20)
23 – Telnet
25 – SMTP
80 – HTTP
110 – POP3
194 – IRC
443 – Secure HTTP (HTTPS)
Registered:
1863 – MSN Messenger
8008 – Alternate HTTP
8080 - Alternate HTTP
What are some of the well known & registered
Well known:
UDP ports?
69 – TFTP
520 – RIP
Registered:
1812 – RADIUS Authentication Protocol
2000 – Cisco SCCP (VoIP)
5004 – RTP (Voice & Video Transport Protocol)
5060 – SIP (VoIP)
What are some of the well known & registered
Well known:
TCP/UDP ports?
53 – DNS
161 – SNMP
531 – AOL Instant Messenger
Registered:
1433 – MS SQL
2948 – WAP (MMS)
5.1.2 Describe packet filtering.
Sometimes called static packet filtering, controls access to a
network by analyzing the incoming and outgoing packets and
passing or halting them based on stated criteria.
At what OSI layer & TCP/IP layer does this
Packet filtering works at the Network layer of the Open
process take place?
Systems Interconnection (OSI) model, or the Internet layer of
TCP/IP.
What does a router use to perform packet
a packet-filtering router uses rules to determine whether to
filtering?
permit or deny traffic based on source and destination IP
addresses, source port and destination port, and the protocol
CCNA EXP 4
CH.5 ACLs
APRIL 2009
How are the rules in the answer above defined?
Describe ACLs.
5.1.3 How does the router apply ACLs?
Does a router filter traffic by default?
What are some guidelines for using ACLs?
Describe the three Ps for applying ACLs on a
router.
What tasks do ACLs perform?
CCNA EXP 4
of the packet.
These rules are defined using access control lists or ACLs.
An ACL is a sequential list of permit or deny statements that
apply to IP addresses or upper-layer protocols. The ACL can
extract the following information from the packet header, test
it against its rules, and make "allow" or "deny" decisions
based on:
Source IP address
Destination IP address
ICMP message type
The ACL can also extract upper layer information and test it
against its rules. Upper layer information includes:
TCP/UDP source port
TCP/UDP destination port
As each packet comes through an interface with an associated
ACL, the ACL is checked from top to bottom, one line at a
time, looking for a pattern matching the incoming packet. The
ACL enforces one or more corporate security policies by
applying a permit or deny rule to determine the fate of the
packet.
No. Without ACLs on the router, all packets that can be routed
through the router pass through the router to the next
network segment.
 Use ACLs in firewall routers positioned between your
internal network and an external network such as the
Internet.
 Use ACLs on a router positioned between two parts of
your network to control traffic entering or exiting a
specific part of your internal network.
 Configure ACLs on border routers-routers situated at
the edges of your networks. This provides a very basic
buffer from the outside network, or between a less
controlled area of your own network and a more
sensitive area of your network.
 Configure ACLs for each network protocol configured
on the border router interfaces. You can configure
ACLs on an interface to filter inbound traffic,
outbound traffic, or both
You can configure one ACL per protocol, per direction, per
interface:
 One ACL per protocol-To control traffic flow on an
interface, an ACL must be defined for each protocol
enabled on the interface.
 One ACL per direction-ACLs control traffic in one
direction at a time on an interface. Two separate ACLs
must be created to control inbound and outbound
traffic.
 One ACL per interface-ACLs control traffic for an
interface, for example, Fast Ethernet 0/0.
 Limit network traffic to increase network
performance.
CH.5 ACLs
APRIL 2009

Provide traffic flow control. ACLs can restrict the
delivery of routing updates.
 Provide a basic level of security for network access.
ACLs can allow one host to access a part of the
network and prevent another host from accessing the
same area.
 Decide which types of traffic to forward or block at
the router interfaces.
 Control which areas a client can access on a network.
 Screen hosts to permit or deny access to network
services. ACLs can permit or deny a user to access file
types, such as FTP or HTTP.
5.1.4 Describe ACLs as they apply to apply to inbound Inbound ACLs-Incoming packets are processed before they
traffic or to outbound traffic.
are routed to the outbound interface. An inbound ACL is
efficient because it saves the overhead of routing lookups if
the packet is discarded. If the packet is permitted by the tests,
it is then processed for routing.
Outbound ACLs-Incoming packets are routed to the outbound
interface, and then they are processed through the outbound
ACL.
What is true about all ACLs?
A final implied statement covers all packets for which
conditions did not test true. This final test condition matches
all other packets and results in a "deny" instruction.
This final statement is often referred to as the "implicit deny
any statement" or the "deny all traffic" statement. Because of
this statement, an ACL should have at least one permit
statement in it; otherwise, the ACL blocks all traffic.
Describe the router logic for an outbound ACL.
Before a packet is forwarded to an outbound interface, the
router checks the routing table to see if the packet is routable.
If the packet is not routable, it is dropped. Next, the router
checks to see whether the outbound interface is grouped to
an ACL. If the outbound interface is not grouped to an ACL,
the packet can be sent to the output buffer.
What are the results of the permit & deny
“To permit" means to send the packet to the output buffer,
statements in outbound lists?
and "to deny" means to discard the packet.
What could one reason be for traffic being
At the end of every access list is an implied "deny all traffic"
unintentionally blocked?
criteria statement. If a packet does not match any of the ACL
entries, it is automatically blocked. The implied "deny all
traffic" is the default behavior of ACLs and cannot be changed.
5.1.5 Describe Standard ACLs.
Standard ACLs allow you to permit or deny traffic from source
IP addresses. The destination of the packet and the ports
involved do not matter. Standard ACLs are created in global
configuration mode.
Explain this example:
The example allows all traffic from network 192.168.30.0/24
access-list 10 permit 12.168.30.0 0.0.0.255
network. Because of the implied "deny any" at the end, all
other traffic is blocked with this ACL.
Describe Extended ACLs.
Extended ACLs filter IP packets based on several attributes, for
example, protocol type, source and destination IP address,
destination IP address, source TCP or UDP ports, destination
TCP or UDP ports, and optional protocol type information for
finer granularity of control. Extended ACLs are created in
global configuration mode.
CCNA EXP 4
CH.5 ACLs
APRIL 2009
Explain this example:
Access-list 103 permit tcp 192.168.30.0 0.0.0.255 any eq 80
5.1.6 What are the two main tasks involved in using
ACLs?
How does a standard ACL work?
5.1.7 Why use named ACLs?
Describe numbered ACLs.
Describe named ACLs.
What numbers are used by AppleTalk? By IPX?
5.1.8 What are the basic rules for the proper
placement of an ACL?
ACL 103 permits traffic originating from any address on the
192.168.30.0/24 network to any destination host port 80
(HTTP).
Step 1. Create an access list by specifying an access list
number or name and access conditions.
Step 2. Apply the ACL to interfaces or terminal lines.
A standard ACL is a sequential collection of permit and deny
conditions that apply to IP addresses. The destination of the
packet and the ports involved are not covered.
A number does not inform you of the purpose of the ACL. For
this reason, starting with Cisco IOS Release 11.2, you can use a
name to identify a Cisco ACL.
You assign a number based on which protocol you want
filtered:
1 – 99 & 1300 – 1999 Standard IP ACL
100 – 199 & 2000 – 2699 Extended IP ACL
You assign a name by providing the name of the ACL:
Names can contain alphanumeric characters
Suggestion: name be written in CAPTIAL LETTERS
Names cannot contain spaces or punctuation & must begin
w/a letter
You can add or delete entries within the ACL
Numbers 600 to 699 are used by AppleTalk, and numbers 800
to 899 are used by IPX.
Every ACL should be placed where it has the greatest impact
on efficiency.
 Locate extended ACLs as close as possible to the
source of the traffic denied. This way, undesirable
traffic is filtered without crossing the network
infrastructure.
 Because standard ACLs do not specify destination
addresses, place them as close to the destination as
possible.
5.1.9 What are some ACL best practices?
5.2.2 What is required in configuring numbered
standard ACLs?
What command defines a standard ACL with a
number in the range of 1 to 99?
What is the maximum number of possible
standard ACLs?
What is the full syntax of the standard ACL?
CCNA EXP 4
You must first create the standard ACL and then activate the
ACL on an interface.
The access-list global configuration command
799:
1 – 99
1300 – 1999
Router(config)#access-list access-list-number [deny | permit |
remark] source [source-wildcard] [log]
CH.5 ACLs
APRIL 2009
Explain the syntax above.
What command displays the current ACLs
configured on a router?
What command removes a standard ACL?
What is the purpose of the remark keyword?
5.2.3 What is a wild card mask?
How do wild card masks use the binary 1s & 0s
as compared to subnet masks?
Wildcard masks use what rules to match binary
1s and 0s?
Why are wildcard masks often referred to as an
inverse mask?
CCNA EXP 4
The show access-list command.
The no form of the access-list command with its number
parameter.
It is used for documentation and makes access lists a great
deal easier to understand. Each remark is limited to 100
characters.
It is a 32-bit quantity used in conjunction with an IP address to
determine which bits in an IP address should be ignored when
comparing that address with another IP address. It is used
when setting up ACLs.
Subnet masks use binary 1s and 0s to identify the network,
subnet, and host portion of an IP address. Wildcard masks use
binary 1s and 0s to filter individual or groups of IP addresses
to permit or deny access to resources based on an IP address.
By carefully setting wildcard masks, you can permit or deny a
single or several IP addresses
Wildcard mask bit 0 - Match the corresponding bit value in the
address
Wildcard mask bit 1 - Ignore the corresponding bit value in the
address
The reason is that, unlike a subnet mask in which binary 1 is
equal to a match and binary 0 is not a match, the reverse is
true.
CH.5 ACLs
APRIL 2009
Describe the following wildcard masks:
0.0.0.0
255.255.255.255
0.0.0.255
Given an IP address of 192.168.16.0 & a
wildcard mask of 0.0.15.255, what are the
results?
Given an IP address of 192.168.0.0 & a wildcard
mask of 0.0.254.255, what are the results?
What is the easiest way to calculate the
wildcard mask?
Describe the keywords host and any in wild
card masks.
5.2.4 How is a standard ACL linked to an interface?
What is the complete syntax for the command
above?
How do you remove a standard ACL?
List the steps to configure a standard ACL
How can you can control which administrative
workstation or network manages your router?
What command restricts incoming and
outgoing connections between a particular VTY
(into a Cisco device) and the addresses in an
access list?
Why is an extended ACL not required to
complete this process?
0.0.0.0: the wildcard mask stipulates that every bit in the IP
address must match exactly. (Match all bits)
255.255.255.255: the wildcard mask stipulates that anything
will match. (Ignore all bits)
0.0.0.255: the wildcard mask stipulates that it will match any
host within the given network.
The first two octets and first four bits of the third octet must
match exactly. The last four bits in the third octet and the last
octet can be any valid number. This results in a mask that
checks for 192.168.16.0 to 192.168.31.0
This shows a wildcard mask that matches the first two octets,
and the least significant bit in the third octet. The last octet
and the first seven bits in the third octet can be any valid
number. The result is a mask that would permit or deny all
hosts from odd subnets from the 192.168.0.0 major network.
By subtracting the subnet mask from 255.255.255.255.
The host option substitutes for the 0.0.0.0 mask. This mask
states that all IP address bits must match or only one host is
matched.
The any option substitutes for the IP address and
255.255.255.255 mask. This mask says to ignore the entire IP
address or to accept any addresses.
Use the ip access-group command.
Router(config-if)#ip access-group {access-list-number | accesslist-name} {in | out}
To remove an ACL from an interface, first enter the no ip
access-group command on the interface, and then enter the
global no access-list command to remove the entire ACL.
Step 1. Use access-list global command to create an entry
Step 2. Use the interface configuration command to select an
interface to which to apply the ACL.
Step3. Use the ip access-group interface configuration
command to activate the existing ACL on the interface.
Restricting VTY access is a technique that allows you to define
which IP addresses are allowed Telnet access to the router
EXEC process. This can be done by using an ACL.
The access-class command in line configuration mode
Filtering Telnet traffic is typically considered an extended IP
ACL function because it filters a higher level protocol.
However, because you are using the access-class command to
filter incoming or outgoing Telnet sessions by source address
and apply filtering to VTY lines, you can use standard ACL
statements to control VTY access.
What is the command syntax of the access-class access-class access-list-number {in [vrf-also] | out}
command?
What is the significance of the in | out
The parameter in restricts incoming connections between a
parameters?
particular Cisco device and the addresses in the access list,
while the parameter out restricts outgoing connections
CCNA EXP 4
CH.5 ACLs
APRIL 2009
What are some considerations when
configuring access lists on VTYs?
5.2.5 How do you use the built-in editing feature for
ACLs?
What is the recommended method for
configuring ACLs?
What are the steps to edit and correct ACLs?
How do you add comments to an ACL?
Where is the comment placed in an ACL?
What is the command syntax to configure a
comment?
Can comments be added to named ACLs? If so,
how?
5.2.6 What are the steps to create a standard named
ACL?
5.2.7 What command displays the contents of all
ACLs?
5.2.8 What is another advantage of using named
ACLs?
CCNA EXP 4
between a particular Cisco device and the addresses in the
access list.
Only numbered access lists can be applied to VTYs.
Identical restrictions should be set on all the VTYs, because a
user can attempt to connect to any of them.
There is no built-in editing feature that allows you to edit a
change in an ACL. You cannot selectively insert or delete lines.
It is strongly recommended that any ACL be constructed in a
text editor such as Microsoft Notepad. This allows you to
create or edit the ACL and then paste it onto the router. For
an existing ACL, you could use the show running-config
command to display the ACL, copy and paste it into the text
editor, make the necessary changes, and reload it.
Step 1. Display the ACL using the show running-config
command.
Step 2. Highlight the ACL, copy it, and then paste it into
Microsoft Notepad. Edit the list as required. Once the ACL is
correctly displayed in Microsoft Notepad, highlight it and copy
it.
Step 3. In global configuration mode, disable the access list
using the no access-list 20 command. Otherwise, the new
statements would be appended to the existing ACL. Then
paste the new ACL into the configuration of the router.
Use the remark keyword to include comments (remarks)
about entries in any IP standard or extended ACL.
The remark can go before or after a permit or deny
statement. You should be consistent about where you put the
remark so that it is clear which remark describes which permit
or deny statement.
To include a comment for IP numbered standard or extended
ACLs use the access-list access-list number remark remark
global configuration command.
For an entry in a named ACL, use the remark configuration
command.
Step 1. Starting from the global configuration mode, use the
ip access-list command to create a named ACL. ACL names are
alphanumeric, must be unique and must not begin with a
number.
Step 2. From the named ACL configuration mode, use the
permit or deny statements to specify one or more conditions
for determining if a packet is forwarded or dropped.
Step 3. Return to privileged EXEC mode with the end
command.
Step 4. Apply the ACL to the appropriate interface.
The show access-lists command.
They are easier to edit. Starting with Cisco IOS Software
Release 12.3, named IP ACLs allow you to delete individual
entries in a specific ACL. You can use sequence numbers to
insert statements anywhere in the named ACL. If you are
using an earlier Cisco IOS software version, you can add
statements only at the bottom of the named ACL. Because
CH.5 ACLs
APRIL 2009
you can delete individual entries, you can modify your ACL
without having to delete and then reconfigure the entire ACL.
5.3.1 What is an advantage of using an extended ACL You can use extended ACLs For more precise traffic-filtering
vs. a standard ACL?
control.
How many total extended ACLs are possible?
100 to 199 and 2000 to 2699 providing a total of 800 possible
extended ACLs.
How are the filter rules applied when using an
The ACL first filters on the source address, then on the port
extended ACL?
and protocol of the source. It then filters on the destination
address, then on the port and protocol of the destination, and
makes a final permit-deny decision.
How are applications filtered when using an
Using the appropriate port number, you can specify an
extended ACL?
application by configuring either the port number or the name
of a well-known port.
Describe the logical operations that can be used equal (eq), not equal (neq), greater than (gt), and less than (lt)
in extended ACLs?
5.3.2 What is the syntax for configuring an Extended
ACL?
Describe the parameters of an Extended ACL.
5.3.4 What are the steps to create extended ACL
using names?
How do you remove a named extended ACL?
5.4.1 List & describe the 3 categories of complex
CCNA EXP 4
Step 1. Starting in the global configuration mode, use the ip
access-list extended name command to define a named
extended ACL.
Step 2. In named ACL configuration mode, specify the
conditions you want to allow or deny.
Step 3. Return to privileged EXEC mode and verify your ACL
with the show access-lists [number | name] command.
Step 4. As an option and recommended step, save your
entries in the configuration file with the copy running-config
startup-config command.
Use the no ip access-list extended name global configuration
command.
Dynamic ACLs (lock-and-key) - Users that want to traverse the
CH.5 ACLs
APRIL 2009
ACLs.
5.4.2 What is another name for Dynamic ACLs
What are some common reasons to use
dynamic ACLs?
What are some of the benefits of Dynamic
ACLs?
What are the steps to configuring Dynamic
ACLs?
5.4.3 What is the purpose of Reflexive ACLs?
How are Reflexive ACLs applied to an interface?
How are Reflexive ACLs defined?
What are the benefits of Reflexive ACLs?
CCNA EXP 4
router are blocked until they use Telnet to connect to the
router and are authenticated.
Reflexive ACLs - Allows outbound traffic and limits inbound
traffic in response to sessions that originate inside the router.
Time-based ACLs - Allows for access control based on the time
of day and week.
Lock-and-Key
When you want a specific remote user or group of remote
users to access a host within your network, connecting from
their remote hosts via the Internet. Lock-and-key
authenticates the user and then permits limited access
through your firewall router for a host or subnet for a finite
period.
When you want a subset of hosts on a local network to access
a host on a remote network that is protected by a firewall.
With lock-and-key, you can enable access to the remote host
only for the desired set of local hosts. Lock-and-key requires
the users to authenticate through a AAA, TACACS+ server, or
other security server before it allows their hosts to access the
remote hosts.
 Use of a challenge mechanism to authenticate
individual users.
 Simplified management in large internetworks.
 In many cases, reduction of the amount of router
processing that is required for ACLs.
 Reduction of the opportunity for network break-ins by
network hackers.
 Creation of dynamic user access through a firewall,
without compromising other configured security
restrictions.
Step 1. Create a login name & password for authentication.
Step 2. Configure the ACL to allow the user to open a Telnet
session to the router—can set a time limit.
Step 3. Apply the ACL to the appropriate interface.
Step 4. Configure the vty lines to use login local & enable the
use of the autocommand command which will terminate the
Telnet session & the user can access the network as allowed.
To force the reply traffic from the destination of a known
recent outbound packet to go to the source of that outbound
packet. This adds greater control to what traffic you allow into
your network and increases the capabilities of extended
access lists.
They are not applied directly to an interface but are "nested"
within an extended named IP ACL that is applied to the
interface.
They can be defined only with extended named IP ACLs. They
cannot be defined with numbered or standard named ACLs or
with other protocol ACLs. Reflexive ACLs can be used with
other standard and static extended ACLs.
 Help secure your network against network hackers
and can be included in a firewall defense.
CH.5 ACLs
APRIL 2009

What additional step is required when
configuring Reflexive ACLs?
5.4.4 How are Time-Based ACLs implemented?
What are the benefits of Time-Based ACLs?
What are the steps to configuring Time-Based
ACLs?
How is the time synchronized?
5.4.5 What are some common ACL errors?
CCNA EXP 4
Provide a level of security against spoofing and certain
DoS attacks. Reflexive ACLs are much harder to spoof
because more filter criteria must match before a
packet is permitted through. For example, source and
destination addresses and port numbers, not just ACK
and RST bits, are checked.
 Simple to use and, compared to basic ACLs, provide
greater control over which packets enter your
network.
Creation of a policy to track the interesting traffic.
To implement time-based ACLs, you create a time range that
defines specific times of the day and week. You identify the
time range with a name and then refer to it by a function. The
time restrictions are imposed on the function itself.
 Offers the network administrator more control over
permitting or denying access to resources.
 Allows network administrators to control logging
messages. ACL entries can log traffic at certain times
of the day, but not constantly. Therefore,
administrators can simply deny access without
analyzing the many logs that are generated during
peak hours.
Step 1. Define the time range to implement the ACL and give
it a name.
Step 2. Apply the time range to the ACL.
Step 3. Apply the ACL to the interface.
The time range relies on the router system clock. The feature
works best with Network Time Protocol (NTP)
synchronization, but the router clock can be used.
Incorrect order of list statements
Incorrect transport protocol used
ACL applied to the wrong interface
ACL applied to the interface in the wrong direction-i.e.
Inbound
CH.5 ACLs
APRIL 2009
Download